$devtoolkit.sh/category/security-crypto

Security / Crypto

Decode JWTs, generate hashes and HMACs, create strong passwords, check password strength, and generate UUIDs. All operations run locally for maximum security.

#DER to PEM Converter

Upload a .der file and convert it to PEM format with the appropriate header and footer.

#Hash Generator[HOT]

Generate SHA-1, SHA-256, SHA-384, and SHA-512 cryptographic hashes from any text.

#HMAC Generator

Generate HMAC-SHA-256/384/512 message authentication codes using a secret key.

JWTJWT Decoder[HOT]

Decode and inspect JSON Web Token header and payload.

#MD5 Generator

Generate an MD5 hash from any text. Pure JavaScript implementation, runs client-side.

***Password Generator[HOT]

Generate strong, random passwords with customizable options.

#Password Strength Checker[HOT]

Analyze password strength by checking length, character variety, and entropy.

#PEM Key Parser

Paste a PEM private or public key to detect its type, algorithm, and key size.

#PEM to DER Converter

Convert a PEM certificate or key to binary DER format and download the .der file.

#RSA Key Generator

Generate RSA key pairs (2048 or 4096-bit) and export as PEM in your browser.

#RSA Key Pair + OpenSSL Command

Generate an RSA key pair and get the OpenSSL command to create a self-signed certificate.

#SSH Key Generator

Generate an RSA SSH key pair. Shows the OpenSSH public key and the PEM private key.

#SSL Certificate Decoder

Paste a PEM certificate and decode its subject, issuer, validity dates, SANs, and more.

#SSL Expiry Calculator

Find out how many days until an SSL certificate expires. Paste a PEM or enter a date.

#TOTP Generator

Generate time-based one-time passwords (RFC 6238) from a Base32 secret key.

#UUID Generator[HOT]

Generate random UUIDs (v4) for use as unique identifiers.

#UUID v7 Generator

Generate time-ordered UUID v7 identifiers with embedded millisecond timestamps.

FAQ

Is it safe to decode JWTs here?
Yes. JWT decoding happens entirely in your browser. The token is never sent to any server. Only the payload is decoded — verification requires the secret key.
Which hash algorithms are supported?
The hash generator supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512 using the Web Crypto API built into your browser.

Related Categories

/category/security-cryptov1.0.0